Question

QUESTION 1 1.      A certificate authority is a trusted third party that is responsible for issuing and...

QUESTION 1

1.      A certificate authority is a trusted third party that is responsible for issuing and revoking certificates within the public key infrastructure.

True

False

10 points   

QUESTION 2

1.      Access control systems can be deployed as stand-alone systems.

True

False

10 points   

QUESTION 3

1.      Which is the most critical factor in the success of a Access Control system?

a.

Network integration

b.

Availability

c.

Accuracy

d.

User acceptance

10 points   

QUESTION 4

1.      Haptic is a concept pertaining to which sense?

a.

smell

b.

hearing

c.

touch

d.

vision

10 points   

QUESTION 5

1.       Which of the following is not a Single Sign-on (SSO) Solution

Kerberos

SESAME

Kermit

Directory Services

10 points   

QUESTION 6

1.       Deny permissions always override Allow permissions.

True

False

10 points   

QUESTION 7

1.       Discretionary Access Control (DAC) manages access to resources using what primary element or aspect?

Classification

Rules

Age

Identity

10 points   

QUESTION 8

1.      A smart card cannot store a biometric template directly on the card.

True

False

10 points   

QUESTION 9

1.       By assigning access permissions so that users can only access those resources which are required to accomplish their specific work tasks, you would be in compliance with?

a.

Cross Training

b.

Principle of least privilege

c.

Need to Know

d.

Job Rotation

10 points   

QUESTION 10

1.       ____ provides access to resources based on a user’s assigned role.

a.

Device authentication

b.

Anonymous access control

c.

Role-privilege access control

d.

Role-based access control

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. true

A cerificate authority issues digital certificates with public key domain

2.false

acess control systems cannot be stand alone as it is connected to several other systems

3.a.network integration

access control systems have many other applications integrated to it via a safe and secure network.

4.c.touch

haptic is pertains to the force that one experiences by touch.

Add a comment
Know the answer?
Add Answer to:
QUESTION 1 1.      A certificate authority is a trusted third party that is responsible for issuing and...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Question 1 (10 points) 5-12 Which of the following is the command to launch the Local...

    Question 1 (10 points) 5-12 Which of the following is the command to launch the Local User Manager? Question 1 options: lusrmgr.msc lusermgmt.msc localuser.msc lusrmgmt.msc Question 2 (10 points) 5-7 Which of the following is the default group membership of all users added after installation of the operating system (not the user added during installation)? Question 2 options: Users Backup operator Guests Administrators Question 3 (10 points) 5-3 Which account type is also knows as a Work Account? Question 3...

  • Question 1 US Passports contain RFID tags which can transmit information such as name, address, photograph,...

    Question 1 US Passports contain RFID tags which can transmit information such as name, address, photograph, and biometrics. True False 1 points Question 2 RFID is often used in which of the following applications? a. Tracking and tracing of items. b. Telematics. c. Access control. d. Electronic payment. e. All of the above. 1 points Question 3 RFID is predominately used for access control. True False 1 points Question 4 It is easy to calculate the ROI of implementing RFID...

  • Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True...

    Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False Question 4 (1 point) In general, private key encryption is safer than public key encryption. Question 4 options: True False Question 5 (1 point) TLS will encrypt TCP/IP transmissions. Question 5...

  • Question 1 The noise floor, also known as additive white Gaussian noise (AWGN), is a continuous...

    Question 1 The noise floor, also known as additive white Gaussian noise (AWGN), is a continuous noise level that appears over a wide spectrum when viewed in the frequency domain. True False 10 points Question 2 When considering the impact of impulse noise, we find that it is more devastating to a digital communications link, than an analog one. Therefore, error control methods should be used on all digital links. True False 10 points Question 3 When two transmitters operate...

  • QUESTION 1 A type of data measured in unrestricted measurable quantities is: A. Discrete B. Continuous...

    QUESTION 1 A type of data measured in unrestricted measurable quantities is: A. Discrete B. Continuous C. Ordinal D. Nominal 2 points    QUESTION 2 One way to control for age as a confounder is to use age-adjusted rates. True False 2 points    QUESTION 3 Useful for measuring diseases that are difficult to pinpoint when an individual becomes a case, and for describing the magnitude of a public health problem is the: A. Mortality rate B. Person-time rate C....

  • Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1...

    Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1 (1 point) Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False T Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False F Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False T Question 4 (1 point) In general, private key encryption is safer than...

  • QUESTION 2 Why is it common to design plumbing chases on each floor? a. Consolidates plumbing...

    QUESTION 2 Why is it common to design plumbing chases on each floor? a. Consolidates plumbing b. Reduces costs c. More flexible space planning Od. Water and waste can run to full height of building e. All of the above QUESTION 3 The reason a 'P' trap is placed on a sink, bath tub, or toilet is: a. To prevent clogs due to hair, food, large solids Allows a place for plumbers to insert a snake to clean out the...

  • Please answer me as soon as possible Quiz Question 1 (1 point) Saved What metric is...

    Please answer me as soon as possible Quiz Question 1 (1 point) Saved What metric is used to measure bandwidth? Question 1 options: a. msec b. bit/sec c. bytes d. number of packets/sec Question 2 (1 point) Saved Ethernet is one of access network technologies. Question 2 options: True False Question 3 (1 point) Saved Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters,...

  • QUESTION 6 True or false. Software applications do not need to support the ability to be...

    QUESTION 6 True or false. Software applications do not need to support the ability to be licensed in a virtual environment when deploying the applications on a virtual machine. True False QUESTION 7 Remotely administering a hypervisor host provides which of the following benefits? The ability to modify only one host at a time Not having physical access to the hypervisor host The ability to manage multiple hypervisor hosts from a single console There is no benefit to remotely managing...

  • QUESTION 1 Which statement results in the value false? The value of count is 0; limit...

    QUESTION 1 Which statement results in the value false? The value of count is 0; limit is 10. (count != 0)&&(limit < 20) (count == 0)&&(limit < 20) (count != 0)||(limit < 20) (count == 0)&&(limit < 20) 10 points    QUESTION 2 If this code fragment were executed in an otherwise correct and complete program, what would the output be? int a = 3, b = 2, c = 5 if (a > b) a = 4; if (...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT